Cart
Sign In

Sorry! ONLINE DELIVERY VIA EMAIL - Expert Training CompTIA CySA+ 2019 Cybersecurity Analyst Plus CS0-001 2019 Video Course Downloadable Content is sold out.

Compare Products
Clear All
Let's Compare!

ONLINE DELIVERY VIA EMAIL - Expert Training CompTIA CySA+ 2019 Cybersecurity Analyst Plus CS0-001 2019 Video Course Downloadable Content

This product has been sold out

We will let you know when in stock
notify me

Featured

Highlights

  • Disclaimer:Online Delivery via E-mail. No Physical Dispatch. Non-Cancellable Product
  • Stream:Comptia
  • Certification:Yes
  • Language:English
  • Format:Downloadable Content
  • Type:Online Fulfillment
  • Duration:10 Hours
  • For queries and concerns drop an email to learning@snapdeal.com
  • SUPC: SDL174432713

Description

Duration : 10.5 Hours 126 Lessons DOWNLOAD Size : 2.96 GB (2 PART DOWNLOAD) Welcome to the Course Exam Foundations Domain 1: Threat Management (27%) 02:40:59 Domain 1: Threat Management CIA Triad Risk Consideration Risk Assessment Identify Threats Identify Vulnerabilities Likelihood, Impact, and Risk Qualitative and Quantitative Assessments Reviewing Controls Network Perimeter Security Network Segmentation Network Access Control Defense Deception Methods Secure Endpoint Management Penetration Testing Security Exercises and Training Reverse Engineering Reconnaissance and Intelligence Footprinting the Network Network Mapping Port Scanning Other Port Scanners NMAP - Demonstration of the world's most popular port scanning tool Passive Reconnaissance Passive Recon - Network Devices Passive Recon - Netstat DHCP Logs and Configs Firewall Logs and Configs System and Host Log Files DNS Harvesting Domain Names and IP Ranges DNS Zone Transfers Whois and Host Commands Information Gathering and Aggregation Organizational Intelligence Detecting, Preventing, and Responding to Reconnaissance Domain 2: Vulnerability Management (26%) 02:02:21 Domain 2: Vulnerability Management Regulatory Requirements Corporate Requirements Scanning Tools Scoping Scans Configuring Scans Scanning Sensitivity Scanning Perspective Authenticated Scanning Maintaining Scanners Standardizing Vulnerabilities Workflow for Remediation Vulnerability Reporting Remediation Priority Implementing and Testing Nessus Vulnerability Scanner: A Walkthrough Interpreting Scan Results Interpreting CVSS Calculating the CVSS Score CVSS Temporal Score Validation of Results Common Vulnerabilities Server and Host Vulnerabilities Network Vulnerabilities Virtualization Vulnerabilities Web Application Vulnerabilities Internet of Things (IoT) Vulnerabilities Domain 3: Cyber Incident Response (23%) 02:17:45 Domain 3: Cyber Incident Response Security Incidents Incident Response Teams Incident Response Phases Incident Response Policy and Procedures Communication and Info Sharing Incident Classification Network Event Monitoring Network Monitoring Tools Detecting Network Events Network Probes and Attacks Server and Host Events Service and Application Events Digital Forensics Forensic Toolkit Components Mobile Forensic Toolkits Forensic Software Training and Certification Forensic Investigation Process Disk Imaging Disk Imaging Using dd Disk Imaging Using FTK Imager Incident Containment Eradication and Recovery Finishing the Response Domain 4: Security Architecture and Toolsets (24%) 02:52:35 Domain 4: Security Architecture and Tool Sets Policy Documents Standard Frameworks Policy-based Controls Audits and Assessments Laws and Regulations Defense in Depth Types of Controls Layered Network Defense Layered Host Security Data Analytics Personnel Security Outsourcing Concerns User Awareness Training Analyzing Secure Architectures What Is Identity? Identity Systems Threats to Identity Systems Attacking AAA Protocols and Systems Targeting Account Lifecycle Identity Exploits Credential Theft Securing Authentication and Authorization System Identity as a Service (IDaaS) Detecting Identity Attacks Federated Identity Systems Software Development Life Cycle (SDLC) Software Development Models Coding for Security Testing Application Security Finding Security Flaws Web Application Vulnerability Scanners Conclusion Practice Exam Simulations and Performance-Based Questions (PBQs)

Terms & Conditions

The images represent actual product though color of the image and product may slightly differ.